Systems and methods for mitigating mobile device loss
First Claim
1. A computer-implemented method for mitigating mobile device loss, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying historical data specifying a plurality of location-time pairs for a mobile computing device, wherein each location-time pair specifies a past location for the mobile computing device and a time corresponding to the past location;
identifying a current location-time pair for the mobile computing device based on a current location of the mobile computing device and a current time;
determining, using a machine-learning technique trained using the plurality of location-time pairs, that the current location-time pair deviates from an expected location-time pair due to a statistical likelihood of the mobile computing device being at the current location at the current time falling below a predetermined threshold;
performing a security measure on the mobile computing device in response to determining that the current location-time pair deviates from the expected location-time pair, wherein performing the security measure on the mobile computing device comprises presenting a challenge comprising a communication disguised as originating from a human contact to verify that an authorized user of the mobile computing device is in possession of the mobile computing device and to conceal from a potential thief that the potential thief is being tested by the challenge.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for mitigating mobile device loss may include (1) identifying historical data specifying a plurality of past locations of a mobile computing device, (2) identifying a current location of the mobile computing device, (3) determining that the current location deviates from an expected location based on the historical data, and (4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.
68 Citations
20 Claims
-
1. A computer-implemented method for mitigating mobile device loss, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying historical data specifying a plurality of location-time pairs for a mobile computing device, wherein each location-time pair specifies a past location for the mobile computing device and a time corresponding to the past location; identifying a current location-time pair for the mobile computing device based on a current location of the mobile computing device and a current time; determining, using a machine-learning technique trained using the plurality of location-time pairs, that the current location-time pair deviates from an expected location-time pair due to a statistical likelihood of the mobile computing device being at the current location at the current time falling below a predetermined threshold; performing a security measure on the mobile computing device in response to determining that the current location-time pair deviates from the expected location-time pair, wherein performing the security measure on the mobile computing device comprises presenting a challenge comprising a communication disguised as originating from a human contact to verify that an authorized user of the mobile computing device is in possession of the mobile computing device and to conceal from a potential thief that the potential thief is being tested by the challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for mitigating mobile device loss, the system comprising:
-
an identification module programmed to identify historical data specifying a plurality of location-time pairs for a mobile computing device, wherein each location-time pair specifies a past location for the mobile computing device and a time corresponding to the past location; a location module programmed to identify a current location-time pair for the mobile computing device based on a current location of the mobile computing device and a current time; a determination module programmed to determine, using a machine-learning technique trained using the plurality of location-time pairs, that the current location-time pair deviates from an expected location-time pair due to a statistical likelihood of the mobile computing device being at the current location at the current time falling below a predetermined threshold; a performing module programmed to perform a security measure on the mobile computing device in response to determining that the current location-time pair deviates from the expected location-time pair, wherein performing the security measure on the mobile computing device comprises presenting a challenge comprising a communication disguised as originating from a human contact to verify that an authorized user of the mobile computing device is in possession of the mobile computing device and to conceal from a potential thief that the potential thief is being tested by the challenge; at least one processor configured to execute the identification module, the location module, the determination module, and the performing module. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify historical data specifying a plurality of location-time pairs for a mobile computing device, wherein each location-time pair specifies a past location for the mobile computing device and a time corresponding to the past location; identify a current location-time pair for the mobile computing device based on a current location of the mobile computing device and a current time; determine, using a machine-learning technique trained using the plurality of location-time pairs, that the current location-time pair deviates from an expected location-time pair due to a statistical likelihood of the mobile computing device being at the current location at the current time falling below a predetermined threshold; perform a security measure on the mobile computing device in response to determining that the current location-time pair deviates from the expected location-time pair, wherein performing the security measure on the mobile computing device comprises presenting a challenge comprising a communication disguised as originating from a human contact to verify that an authorized user of the mobile computing device is in possession of the mobile computing device and to conceal from a potential thief that the potential thief is being tested by the challenge. - View Dependent Claims (20)
-
Specification